1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kiruha [24]
3 years ago
13

Which type of firewall policy calls for a firewall to deny all traffic by default?

Computers and Technology
1 answer:
charle [14.2K]3 years ago
3 0
Restrictive policy is a kind of policy calls for a firewall to contradict all traffic by default. The first rule denies all traffic on any service and using any port. To permit a specific type of traffic, a new rule must be placed ahead of the deny all rule. A firewall should enforce the overall policy recognized by the network administrator. Enforcement is controlled mainly over setting up packet filtering rules which is a rule base comprises a set of these rules. 
You might be interested in
Select the correct answer.
Vedmedyk [2.9K]
D because of the sun
6 0
3 years ago
What does the following code alert?
goldenfox [79]

It is just a declaration of an object variable, <em>person</em>, in JavaScript. Within a <em>person</em> object, there are key:value pairs. The code that you  shared has the following keys: name, age, and favouriteFood, whereas the values of those keys are: Mike, 25, and pizza.


There is <em>no</em> alert statement in this code snippet; therefore, it <em>will not alert </em>anything. This code contains only a variable called <em>person, </em>and that's it!

5 0
3 years ago
Read 2 more answers
What is one way you might code-switch when posting a comment to a class discussion?
irina [24]

Answer:

The term code switching has been expanded and can encapsulate in any situation that speaker find to be switch from vocabulary.

Explanation:

It is a truly remarkable skill when you communicate your emotions, thoughts and opinion to others. It does not mean that we just to communicate our language but our language influence our thought, emotions and language and self identity.

we communicate our culture that is reflected in our language. Our language tells that who we are and from where we comes.

Code switching is related to the speakers alternates use of multiple language. in the one communication.

For example: Grace for beautiful gift ( Esta awesome).

7 0
3 years ago
How to do c++ programming
Kipish [7]

Answer:

Explanation:

learn by picking up courses and books

but if you don't have any prior programming experience, i recommend you DON'T do c++ first, but instead use an easier language to get the hang of it, like Python.

8 0
3 years ago
What are the main advantages of a solid-state drive (SSD) over a conventional hard disk drive (HDD)? (Choose three)
Masja [62]

Answer:

The benefits of SSDs over HDDs include:

Faster read/write speeds. SSDs can access large files quickly.

Quicker boot times and better performance. Because the drive does not need to spin up as an HDD would, it is more responsive and provides better load performance.

Durability. ...

Power consumption. ...

Quieter. ...

Size.

Explanation:

4 0
3 years ago
Other questions:
  • WHAT SHOULD YOU DO IF AN ONCOMING CAR AT NIGHT APPROACHES WITH ITS HIGH-BEAMS ON?
    6·1 answer
  • According to your textbook, which of the following is a consequence of the quick development of new technologies in the digital
    8·1 answer
  • What inventor patented the first american movie projector
    15·2 answers
  • What three conditions must be satisfied in order to solve the critical section problem?
    13·1 answer
  • A risk handling technique in which the organization chooses to simply do nothing, as the cost of the risk being actualized is lo
    15·1 answer
  • A user saves a password on a website the user logs into from a desktop. Under which circumstances will the password be saved on
    7·1 answer
  • What is the most common way for an attacker outside of the system to gain unauthorized access to the target system?
    15·1 answer
  • What is network topology? PLZZZ HURRY
    9·1 answer
  • What is the central idea of the second section:
    14·1 answer
  • What is the best method to avoid getting spyware on a machine
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!